We’re starting off 2016 with an issue packed with news and useful info to help you start the year right. First on our article roster is a list of the top tech trends seen in the Consumer and Electronic Show (CES) in Las Vegas last month. Second is another list of the threat you need to look out for in 2016. While you’re at it rethinking your digital security, it may also be a good idea to do some password spring-cleaning with this article on the 25 Most Common Passwords that you should not use.

Looks like the big media companies are doing some spring cleaning of their own as Netflix announced it would start blocking VPN users who try to access the Netflix content of countries other than their own.

On the vulnerability front, a critical Linux vulnerability (CVE-2016-0728) affecting versions 3.8 and higher was found and patched.

In January Password security company SplashData released their annual list of the “Worst Passwords” or the most common passwords used based on 3.3 million leaked passwords in 2014. Top 5 are the following:

123456 (Unchanged from 2013)

password (Unchanged)

12345 (Up 17)

12345678 (Down 1)

qwerty (Down 1)

Check the whole list and find some tips on how to create a strong password here.

In mid January Netflix announced that it would start cracking down on accounts that use VPN to access geographically restricted. In the statement, Netflix said that it would start blocking by detecting VPN proxies. This move is in response to increasing pressure from content owners for Netflix to enforce country-licensing restrictions. Rival streaming service Hulu is already actively blocking geo-hopping VPNs.

As yet, no date has been released on when Netflix will start to carry out its VPN-blocking scheme.

In late January security startup Perception Point reported a critical Linux vulnerability (CVE-2016-0728) affecting versions 3.8 and higher. What makes this particular kernel flaw stand out is that it also affects Android devices running Kit-Kat or higher. To exploit the vulnerability, a malicious user needs local access on a Linux server. Specifically, the bug is in the keychain facility, which is built into several flavors of Linux.